Network Security and Management Sample Clauses

Network Security and Management. Subscriber agrees that Stanford may block traffic to and from any source, as it deems necessary to secure its network and/or eliminate spam. Stanford may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers as identified in section 6 of Stanford's Administrative Guide. Stanford may take these actions, with or without notice, in situations where Stanford believes, in its sole discretion that Subscriber may harm the Stanford network or disrupt the performance of the Internet Service for other users or where Subscriber is transmitting or is otherwise connected with what Stanford considers in its sole discretion to be spam. Subscriber agrees that Stanford is entitled to damages if Subscriber is transmitting or is otherwise connected with spam. Subscriber agrees Stanford is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Subscriber agrees to pay Stanford liquidated damages of five dollars (U.S. $5.00) for each piece of spam transmitted from or otherwise connected with Subscriber's account.
AutoNDA by SimpleDocs
Network Security and Management. Customer agrees that Bitwise may block traffic to and from any source, including, without limitation, the deletion of any electronic mail, as it deems necessary to secure its network and/or eliminate spam. Bitwise may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers, including, but not limited to, traffic prioritization and protocol filtering, and in some instances, suspend or terminate access by Customer to the network. Bitwise may take these actions, with or without notice, in situations where Bitwise believes, in its sole discretion, that Customer may harm the Bitwise network or disrupt the performance of the Service for other users or where Customer is transmitting or is otherwise connected with what Bitwise considers in its sole discretion to be spam. Customer agrees that Bitwise is entitled to damages if Customer is transmitting or is otherwise connected with spam. Customer agrees Bitwise is entitled to actual damages.
Network Security and Management. Subscriber agrees that Raptor Wireless may block traffic to and from any source, including, without limitation, the deletion of any electronic mail, as it deems necessary to secure its network and/or eliminate spam. Raptor Wireless may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers as identified in Raptor Wireless's AUP. Raptor Wireless may take these actions, with or without notice, in situations where Raptor Wireless believes, in its sole discretion that Subscriber may harm the Raptor Wireless network or disrupt the performance of the Internet Service for other users or where Subscriber is transmitting or is otherwise connected with what Raptor Wireless considers in its sole discretion to be spam or other malicious code or software. Subscriber agrees that Raptor Wireless is entitled to damages if Subscriber is transmitting or is otherwise connected with spam or other malicious code or software. Subscriber agrees Raptor Wireless is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Subscriber agrees to pay Raptor Wireless liquidated damages of five dollars for each piece of spam or other malicious code or software transmitted from or otherwise connected with Subscriber's account.
Network Security and Management. Subscriber agrees that Comspan may block traffic to and from any source, including, without limitation, the deletion of any electronic mail, as it deems necessary to secure its network and/or eliminate spam. Comspan may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers as identified in Comspan's AUP. Comspan may take these actions, with or without notice, in situations where Comspan believes, in its sole discretion that Subscriber may harm the Comspan network or disrupt the performance of the Internet Service for other users or where Subscriber is transmitting or is otherwise connected with what Comspan considers in its sole discretion to be spam. Subscriber agrees that Comspan is entitled to damages if Subscriber is transmitting or is otherwise connected with spam. Subscriber agrees Comspan is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Subscriber agrees to pay Comspan liquidated damages of five dollars (U.S. $5.00) for each piece of spam transmitted from or otherwise connected with Subscriber's account
Network Security and Management. Subscriber agrees that Airlink may block traffic to and from any source as it deems necessary to secure its network and/or eliminate spam. Airlink may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers as identified in Airlink's NMP. Airlink may take these actions, with or without notice, in situations where Airlink believes, in its sole discretion that Subscriber may harm the Airlink network or disrupt the performance of the Service for other users or where Subscriber is transmitting or is otherwise connected with what Airlink considers in its sole discretion to be spam or other malicious code or software. Subscriber agrees that Airlink is entitled to damages if Subscriber is transmitting or is otherwise connected with spam or other malicious code or software. Subscriber agrees Airlink is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Subscriber agrees to pay Airlink liquidated damages of five dollars (U.S. $5.00) for each piece of spam or other malicious code or software transmitted from or otherwise connected with Subscriber's account.
Network Security and Management. Subscriber agrees that Xxxxxxx may block traffic to and from any source, including, without limitation, the deletion of any electronic mail, as it deems necessary to secure its network and/or eliminate spam. Xxxxxxx may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers as identified in Xxxxxxx’x AUP. Xxxxxxx may take these actions, with or without notice, in situations where Xxxxxxx believes, in its sole discretion that Subscriber may harm the Xxxxxxx network or disrupt the performance of the Internet Service for other users or where Subscriber is transmitting or is otherwise connected with what Xxxxxxx considers in its sole discretion to be spam. Subscriber agrees that Xxxxxxx is entitled to damages if Subscriber is transmitting or is otherwise connected with spam. Subscriber agrees Xxxxxxx is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Subscriber agrees to pay Xxxxxxx liquidated damages for each piece of spam transmitted from or otherwise connected with Subscriber’s account.
Network Security and Management. Customer agrees that CCVN may block traffic to and from any source, including, without limitation, the deletion of any electronic mail, as it deems necessary to secure its network and/or eliminate spam. CCVN may take other actions, in its sole discretion, to manage or protect its network or to benefit the greatest number of its subscribers, including, but not limited to, traffic prioritization and protocol filtering, and in some instances, suspend or terminate access by Customer to the network. CCVN may take these actions, with or without notice, in situations where CCVN believes, in its sole discretion, that Customer may harm the CCVN network or disrupt the performance of the Service for other users or where Customer is transmitting or is otherwise connected with what CCVN considers in its sole discretion to be spam. Customer agrees that CCVN is entitled to damages if Customer is transmitting or is otherwise connected with spam. Customer agrees CCVN is entitled to actual damages, however, if actual damages cannot be reasonably calculated, Customer agrees to pay CCVN liquidated damages of five dollars (U.S. $5.00) for each piece of spam transmitted from or otherwise connected with Customer’s account.
AutoNDA by SimpleDocs

Related to Network Security and Management

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Network Maintenance and Management 36.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the Government, escalation processes, etc.) to achieve this desired result.

  • Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Access Management The Engineer shall coordinate and evaluate access management within the project limits in accordance with the latest State Access Management Manual or as directed by the State.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Implementation and Management 1.1 Properly constituted Occupational Health and Safety (OH&S) Committees or, where there is no OH&S Committee, Site Safety Supervisors/Safety Officers in conjunction with worker representatives, are the appropriate bodies to implement and administer alcohol and drug policy/programs (* see below).

Time is Money Join Law Insider Premium to draft better contracts faster.